Search

Advanced Search

ePASS Service Launched in District Jammu

Jit Raj, Jammu and Kashmir jit[dot]raj[at]nic[dot]in
  |   Apr 21, 2020
Deputy Commissioner Jammu Sushma Chauhan IAS launching the ePass Service
Deputy Commissioner Jammu Sushma Chauhan IAS launching the ePass Service

DIO Jammu Sanjay Gupta, explaining features of ePass to Deputy Commioner Jammu
DIO Jammu Sanjay Gupta, explaining features of ePass to Deputy Commioner Jammu

On 13/03/2020 Deputy Commissioner Jammu Ms. Sushma Chauhan IAS, today launched ePASS service in District Jammu for persons residing within  red zone areas as a proactive measure for COVID19 containment in District Jammu in order to allow restricted movement out of these zones particularly for attending to medical emergencies,. Speaking on the occasion Deputy Commissioner Jammu informed that “this service will benefit emergency movement of public of these areas who are otherwise not allowed to move out of containment zones as per prescribed guidelines. Now after the launch of this ePASS facility, any person in a situation of emergencyresiding in the pre definedred /containment zones can now apply online by going to the web site https://jammu.nic.in/COVID19 and clicking on the link ePASS service. The applicant will then be redirected to a web site for filling some details like their own particulars, purpose for which the pass is required”.

 

Deputy Commissioner also informed that though initially this service is available only for red zones, which shall be subsequently extended to entire district.Deputy Commissioner Jammu Ms. Sushma Chauhan IAS appreciated the services of NIC HQ New Delhi, SIO NIC J&K and particularly DIO NIC Jammu for bringing the application to work in just 48 hours after discussion. Also present during the launch of the red zone ePASS service were Sh. Satish Sharma and Sh. Hitesh Gupta, KAS, deputed in DC Office Jammu as officers on special duty for COVID containment.

 

NIC J&K has designed and developed this generic service with the requirements of the entire state in mind and, initially, it is being launched in District Jammu. Subsequently, any District of J&K UT interested in subscribing to this service can be on-boarded seamlessly with very little effort by customization on the Service Plus framework of National Informatics Centre (NIC).

At present, this application has been replicated in Six more District of J&K i.e. Kathua, Reasi, Doda, Anantnag, Pulwama and Srinagar and will be replicated in   the remaining District soon.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...